Start64!The Enigma Protector includes a wide range of unique features aimed at protecting executable files from illegal copying, hacking, modification, and analysis. The supported formats include almost all types of 32- and 64-bit executable files (exe, src, dll, ocx, bpl, etc.) and .NET files created using various development tools, such as MS Visual Studio C#/C++/VB/VB.NET, Borland Delphi/C++, FreePascal, MASM, TASM and others. The protected files can be run on all versions of Windows 95/98/ME/2000/XP/2003/Vista/2008 and Windows 7.

The Enigma Protector will make your software resistant to cracking, and thus will increase your sales. The use of attack-proof cryptoalgorithms for registration key generation will make it impossible for others to reconstruct or reproduce the registration key generator for your software. Various methods of code obfuscation, mutation and virtualization will help protect your application from hacking, modifying, disassembling, illegal retrieval of unique functions and data, etc.

The Enigma Protector 64bit version

The Enigma Protector has a hard scheme of registration keys generation:

  • comfortable interface for creating and verifying registration keys. You do not need to look for any safe decisions on how to generate registration keys for customers. The Enigma Protector helps you to create keys with a very safe algorithm like RSA with up to 512-bits key length!
  • special Enigma API. Enigma API is a set of special functions to communicate between the module and the Enigma loader. You are able to get full information about registration keys, current trial parameters, etc.
  • hardware locking of registration keys. This perfect feature helps you to generate registration keys for a particular computer only! The registration key generated with the hardware locking function enables work only on one PC you have chosen.
  • time limited registration keys. If you need to limit the time of usage of a registered version of the module, you will be able to do it, just create a time-limited registration key!

The Enigma Protector has a wide range of features to limit time of module usage:

  • executions, days, date, time limitations. The main idea of shareware modules is "try before you buy". The customer should see how the application works and what features it has, let's show these features but do not forget to limit usage time to increase motivation to buy application.
  • system clock control. This feature is used to control system clock reversing. It helps you to avoid dishonest customers.

The Enigma Protector has a lot of features to make your software resistant to cracking:

  • anti-debugger tricks. Debuggers are the special tools that allow you to reverse source machine codes of the executed module. All reverse engineers use these tools to understand how your module works or how the module protection works. Using this feature helps to avoid simultaneous execution of the protected module with debug tools.
  • control sum checking. Control sum is special data which helps to understand if the data region is modified or not. Every crack (removing of protection etc.) needs to modify some of machine code region. The Enigma Protector is able to check if the sources are modified and an alert is made. The Enigma Protector checks not only machine codes of the protected module, but also own sources!
  • set startup password. Sometimes you need to limit count of users who are using protected module to a particular group, startup password feature is the most safe decision.
  • any additional features to check number of simultaneously executed copies of the protected module, file name of the module, disk type where the module is executed.
  • checkup of external files. If your application package contains any other files except the main protected executable module you may use this feature to control these files against modifications.
  • checkup of executed processes. This feature is used for checking if some files/processes are executed. It is performed by checking of module file name, process windows text or class. This may help to avoid execution of protected module if any debuggers/screencaptures/monitores are executed.
  • checkup of installed services.
  • checkup of Windows version.
  • checkup of Virtual Machines. If the file is executed under Virtual Machine (VMWare, Virtual PC etc) the execution is terminated.
  • hard modifications of import table of the executable. Nobody will know what import libraries your module uses.

The Enigma Protector has features to help the programmer to add beautiful things into existing module without writing any additional sources strings:

  • splash screen. Add splash screen to the module startup. Choose your own picture to be shown when the module starts.

The Enigma Protector 64bit version